Mississippi Finally Removes the State Flag! #BlackLivesMatter

America is having a watershed moment: If there is a Pandemic silver lining it is when we push the reset button.

Speaking Truth to Power!
Business has to reset!
No Excuse!

What’s Personal is Political
we are fighting to be our best!!

Go Team Go!!

After 126 years of  Jim Crow  this is NOW Our New Normal

Mississippi’s state flag bearing Confederate battle emblem REMOVED

It’s off the state’s capital building.

The Racist Confederate Flag of the KKK  that nobody wants to see anywhere, any day, ever again  was  removed from public view.

GET IT OUT OF OUR SIGHT!

 

Princeton just dropped the name of Woodrow Wilson from their policy center.

#BLM is partly funded by The Ford Foundation, the latter set up in the late 1930s by the CIA to funnel cash to front groups, like NGOs and “independent” media.
https://www.wsws.org/en/articles/2016/10/11/pers-o11.html

Ford’s newspaper merged racism with anti-Semitism by calling Prohibition-era whiskey “n_-r gin” and labeling jazz “Yiddish moron music.” [more]

#BoycottFacebook #BoycottWhitePower #BoycottQAnon

Tweety Amin’s 2020 Election Playbook
https://www.theguardian.com/commentisfree/2020/jun/28/donald-trump-re-election-playbook-25-lies-cheats-and-steals
Donald Trump’s re-election playbook: 25 ways he’ll lie, cheat and abuse his power ~ Robert Reich Sun 28 Jun 2020
From now until November, opponents of the most lawless president in history face a fight for democracy itself. Donald Trump will do anything to be re-elected. His opponents are limited because they believe in democracy. Trump has no limits because he doesn’t.

WHATEVER COMPANY YOU WORK FOR
– MAKE SURE YOU TELL THEM TO GIVE THE WORKERS FOR HEALTH PROTECTION IN FACTORIES.

TELL LEADERSHIP WHERE YOU WORK 
WHAT YOU THINK IS IMPORTANT FOR THAT COMPANY TO DO
– THIS IS YOUR MOMENT 
CEO’S NEED TO BE TOLD YOU WON’T DEVELOP SOFTWARE THAT SPYS, THAT IS PART OF THEIR $URVEILLANCE MODEL OF TAKING AND $ELLING DATA.

– TELL THEM YOU WANT WOMEN PROGRAMMERS, DEV OPS, AND PEOPLE OF COLOR ON ADVISORY BOARDS AND IN THE V.P. SLOTS.

The Supreme Court has ruled that Louisiana’s attempt to place undue burdens on abortion clinics is unconstitutional. I took action in this case because in this nation women have a constitutional right to an abortion. No state can trample that right.
Trump broke the law when his administration used military funds to build the border wall.
Iran issues arrest warrant for Donald Trump, requests help from Interpol
https://www.smh.com.au/world/middle-east/iran-issues-arrest-warrant-for-donald-trump-requests-help-from-interpol-20200629-p557el.html

DELETE #TIKTOK and 53 other iOS apps for your #PRIVACY

TikTok [chinese company)  and 53 other iOS apps still snoop your sensitive clipboard data

KlipboardSpy: How malicious apps on iPhone and iPad abuse the Universal Clipboard on your Mac.

All credit to Mysk and his colleague Hal Bakry.

DELETE #TIKTOC

TikTok continues to access some of Apple users most sensitive data, which can include passwords, cryptocurrency wallet addresses, account-reset links, and personal messages.

Another 53 apps identified in March haven’t stopped either.

Apps repeatedly reading any text that happens to reside in clipboards, which computers and other devices use to store data that has been cut or copied from things like password managers and email programs. With no clear reason for doing so, researchers Talal Haj Bakry and Tommy Mysk found, the apps deliberately called an iOS programming interface that retrieves text from users clipboards.

https://arstechnica.com/gadgets/2020/06/tiktok-and-53-other-ios-apps-still-snoop-your-sensitive-clipboard-data/

With the developer beta release of iOS 14
Apple added provides a banner warning every time an app reads clipboard contents. As large numbers of people began testing the beta release, they quickly came to appreciate just how many apps engage in the practice and just how often they do it.

iOS14 Catches Apps Spying on Your Clipboard racked up more than 87,000 views since it was posted on Tuesday, shows a small sample of the apps triggering the new warning.
https://www.youtube.com/watch?v=pRSWdtoUAjo

Not just TikTok

The behavior is visible in news apps for Fox News, the New York Times and the Wall Street Journal. You’ll also find it in games like Bejeweled, Fruit Ninja and PUBG Mobile. Social apps like Viber, Weibo and Zoosk. Some utility and media apps do this as well, including AccuWeather, DAZN and Overstock.

In all, the researchers found the following iOS apps were reading users clipboard data every time the app was opened with no clear reason for doing so:

  • #DELETE App Name — BundleID

#DELETE News Apps

  • #DELETE ABC News — com.abcnews.ABCNews
  • #DELETE Al Jazeera English — ajenglishiphone
  • #DELETE CBC News — ca.cbc.CBCNews
  • #DELETE CBS News — com.H443NM7F8H.CBSNews
  • #DELETE CNBC — com.nbcuni.cnbc.cnbcrtipad
  • #DELETE Fox News — com.foxnews.foxnews
  • #DELETE News Break — com.particlenews.newsbreak
  • #DELETE New York Times — com.nytimes.NYTimes
  • #DELETE NPR — org.npr.nprnews
  • #DELETE ntv Nachrichten — de.n-tv.n-tvmobil
  • #DELETE Reuters — com.thomsonreuters.Reuters
  • #DELETE Russia Today — com.rt.RTNewsEnglish
  • #DELETE Stern Nachrichten — de.grunerundjahr.sternneu
  • #DELETE The Economist — com.economist.lamarr
  • #DELETE The Huffington Post — com.huffingtonpost.HuffingtonPost
  • #DELETE The Wall Street Journal — com.dowjones.WSJ.ipad
  • #DELETE Vice News — com.vice.news.VICE-News

#DELETE Game Apps

  • #DELETE 8 Ball PoolTM com.miniclip.8ballpoolmult
  • #DELETE AMAZE!!! com.amaze.game
  • #DELETE Bejeweled com.ea.ios.bejeweledskies
  • #DELETE Block PuzzleGame.BlockPuzzle
  • #DELETE Classic Bejeweled com.popcap.ios.Bej3
  • #DELETE Classic Bejeweled HDcom.popcap.ios.Bej3HD
  • #DELETE FlipTheGun com.playgendary.flipgun
  • #DELETE Fruit Ninja com.halfbrick.FruitNinjaLite
  • #DELETE Golfmasters com.playgendary.sportmasterstwo
  • #DELETE Letter Soup com.candywriter.apollo7
  • #DELETE Love Nikki com.elex.nikki
  • #DELETE My Emma com.crazylabs.myemma
  • #DELETE Plants vs. ZombiesTM# Heroes com.ea.ios.pvzheroes
  • #DELETE Pooking – Billiards City com.pool.club.billiards.city
  • #DELETE PUBG Mobile com.tencent.ig
  • #DELETE Tomb of the Mask com.happymagenta.fromcore
  • #DELETE Tomb of the Mask: Color com.happymagenta.totm2
  • #DELETE Total Party Kill com.adventureislands.totalpartykill
  • #DELETE Watermarbling com.hydro.dipping

#DELETE Social Networking Apps

  • #DELETE TikTok — com.zhiliaoapp.musically
  • #DELETE ToTalk — totalk.go

https://arstechnica.com/gadgets/2020/06/tiktok-and-53-other-ios-apps-still-snoop-your-sensitive-clipboard-data/

Snowden says  Tech Workers Are Complicit in How Their Companies Hurt Society

“People who make spreadsheets, people who make weather apps, people who just wanted to create family tree websites, all of them are being bought out, are being subverted, are being corrupted.”

THE CARGO CULTING OF AMERICAN APP DEVELOPERS AND PROGRAMMERS BY THE TECHNO OLIGARCH GODS OF SILICON VALLEY

The cargo culting of american developers and programmers
Any developer at Facebook knows exactly what they are doing. They are building a machine that is unraveling democracy and order in the world and they are every bit as complicit.

TikTok and 53 other iOS apps still snoop your sensitive clipboard data.
Passwords, bitcoin addresses, and anything else in clipboards are free for the taking.
https://arstechnica.com/gadgets/2020/06/tiktok-and-53-other-ios-apps-still-snoop-your-sensitive-clipboard-data/

Republican Senators Graham, Cotton, and Blackburn push bill requiring tech companies to help access encrypted data and grant backdoor access to encrypted data
https://www.judiciary.senate.gov/press/rep/releases/graham-cotton-blackburn-introduce-balanced-solution-to-bolster-national-security-end-use-of-warrant-proof-encryption-that-shields-criminal-activity

The proposed legislation is Congress’ latest attempt to weaken encryption from tech giants.
https://www.cnet.com/news/republicans-push-bill-requiring-tech-companies-to-help-access-encrypted-data/

 Republican bill seeks end to ‘warrant-proof’ encryption
https://appleinsider.com/articles/20/06/24/republican-bill-seeks-end-to-warrant-proof-encryption
U.S. Senate Republicans on Tuesday introduced the Lawful Access to Encrypted Data Act, a bill that seeks to weaken encryption technologies that have in the past put a damper on law enforcement operations.
The proposed bill is heralded by sponsors as a means to strengthen national security interests and “better protect communities across the country” by ending “warrant-proof” encrypted technology used by terrorists and bad actors.
If enacted, the law would force tech companies to help agencies access encrypted data in service of a warrant.
Senate Judiciary Committee Chairman Lindsey Graham (R-SC) and Senators Tom Cotton (R-AR) and Marsha Blackburn (R-TN) proposed the act.
“Tech companies’ increasing reliance on encryption has turned their platforms into a new, lawless playground of criminal activity. Criminals from child predators to terrorists are taking full advantage,” said Cotton. “This bill will ensure law enforcement can access encrypted material with a warrant based on probable cause and help put an end to the Wild West of crime on the Internet,”
Government entities, namely law enforcement agencies, have long sought to dismantle strong encryption methods, including end-to-end messaging encryption, on-device encryption and other forms of personal data security, in a bid to streamline investigations. Critics and tech companies that market encrypted products, like Apple, argue strong encryption is a vital cog in the data privacy machine that, if weakened, leaves users vulnerable to attack.
“Terrorists and criminals routinely use technology, whether smartphones, apps, or other means, to coordinate and communicate their daily activities. In recent history, we have experienced numerous terrorism cases and serious criminal activity where vital information could not be accessed, even after a court order was issued. Unfortunately, tech companies have refused to honor these court orders and assist law enforcement in their investigations,” Graham said in a statement.
While not mentioned by name, Apple in 2016 refused to comply with FBI requests to create a “backdoor” into an iPhone associated with a terror suspect. CEO Tim Cook at the time called the demand “dangerous,” noting a backdoor into one device would put the security of millions in jeopardy.
Still, government bodies have persisted.
“My position is clear: After law enforcement obtains the necessary court authorizations, they should be able to retrieve information to assist in their investigations,” Graham said. “Our legislation respects and protects the privacy rights of law-abiding Americans. It also puts the terrorists and criminals on notice that they will no longer be able to hide behind technology to cover their tracks.”
While Apple has vehemently argued against the creation of backdoors, it continues to comply with court orders and valid warrants for data as dictated by existing law.

Today’s proposal includes a provision that would allow the attorney general to hold a competition that gives a prize for discovering methods of accessing encrypted data while “maximizing privacy and security.” As noted by CNET, security experts have long regarded such concepts as impossible.

“The bill announced today balances the privacy interests of consumers with the public safety interests of the community by requiring the makers of consumer devices to provide law enforcement with access to encrypted data when authorized by a judge,” Attorney General Bill Barr said in a statement, CNET reports. “I am confident that our world-class technology companies can engineer secure products that protect user information and allow for lawful access.”
The proposed bill is the latest attempt to dilute strong encryption technologies developed by big tech companies.
Last year, the White House mulled support of measures that would ban end-to-end encryption techniques. More recently, Apple, Facebook and others were threatened with an act that would erode Section 230 protections if they continue to shield malicious content behind encryption protocols.

Politicians need to ERODE Section 230 protections for oligarchs today!

Origin and Evolution of Music, Words, and Language.

Origin and Evolution of Music, Words, and Language.

FIND ALL THE INFORMATION BELOW DISCUSSED AT THE LINK ABOVE.

The evolutionary function of music is language.

CyberPlayGround NetHappenings©1989“Music is Language, Language is Music” ~ Karen  Ellis

Interdisciplinary Connections between Language, Music, Evolution, and Reading

EVOLUTIONARY SCIENCE SHOWS THE INTERSPECIES ROOTS OF LANGUAGE
  • This is how and why we develop PERFECT PITCH
  • WHY DO CHILDREN SING? — THE ANSWER
  • Listen to Human SILBO Whistle Language
  • Hear Piraha sung speech
  • Hear: WHALE Whistle Hear Humpback Chorus
  • Hear A Mexican Whistler

BIRDS, BEES, WHALES, DOLPHINS, GORILLA, BONOBO, LION ALL HAVE LANGUAGE.

INTERSPECIES ANIMAL LANGUAGE:
Interspecies Language Evolution From Whistling to Speech. Other species that communicate with each other use clicks, whistles, song and gestures.

HAND CLAPPING AND HOOTING
You can imagine that the clapping and hooting you hear in the audience is one of the last vestiges of gestures we still have as evolution propelled us towards a species that became a group to use speech / language.

DRUM LANGUAGE

Ancient Text Messages of the Yoruba Bata Drum – Cracking the Code.
The analysis draws the direct links between what is spoken in Yoruba, how Yoruba is transformed in to the coded language (ena), how ena prescribes the drum strokes and, finally, how listeners (and which listeners) extract linguistic meaning from what is drummed.

DRUM LANGUAGE – AMERICAN VIRGIN ISLANDS
When Twi is drummed, the resulting drum language is called ayan.

The Drummer – Talking Drums

The term ‘2nd line march,’ originates in the New Orleans African American/creole traditional funeral processions.
The first line in the procession is the family of the deceased, and the band marches along in the second line.

The Etymology of the word JAZZ 
It is characterized by blue notes, syncopation , swung note , call and response (music) , polyrhythms, and improvisation.

The 2nd Line March beat, as it relates to timing in Irish tradition starts with the origin of jazz mostly in the New Orleans and the Mississippi River delta. Western classical music out of Europe usually plays out in simple time (a single time signature and rhythm) jazz time is rooted in an import from Africa. A Simultaneous juxtaposition and interaction of two different rhythms, simultaneously. In the case of the 2nd line march beat, the simultaneous playing of 4/4 and 3 against 2.

The pattern is  ^two times, at the same time^
6/8 rhythm, and  4/4 over the top.
“THAT is jig timing!!

Polyrhythms The Late Great Mali Master Drummer (Djembe Fola) Aruna Sidibe w/ Brulye Dounbia in Mali

RHYTHM and ABSOLUTE TIME – WHERE DOES IT COME FROM?
The Science of Why Using Music to Teach Children Works.

The Gesture – Before words you will use your hands. Baby Sign Language. The movement of your hand. The sound. Even the way we represent animals is cultural.

The value of play is found in the work of Speech, Clapping, jumping, and circle game rhymes which use the tactile pathways and help wire the brain for higher thinking and reading skills.

National Children’s Folksong Repository – the value of children’s oral culture – clapping hands and speech.

  • Structure exposes the evolutionary roots of language.
  • Scientists Report Finding a Gene for Speech
  • How do babies begin to acquire language?
    Rhythmic patterns underlie the human language. How children learn the meanings of words. Grammer is hard wired. Letters are shaped that way for a reason. Rhythm and pitch give the meaning.

By 6 months of age
infants develop a map in the auditory cortex of the phonetic sounds in the native language their mother or caretaker speaks.
Depending on the language they either will or will not develop perfect pitch.

  • Toddlers Understand Complex Grammar

LANGUAGE structure may reveal more about human origins than vocabulary.

WHY should links exist between music and language?
Some researchers think that the two might have a common evolutionary origin.

Literacy — Origin of Words, Language Evolution

THE NEW PEDAGOGY AN INTERDISCIPLINARY MODEL